Bug 1921450 (CVE-2021-3344) - CVE-2021-3344 openshift/builder: privilege escalation during container image builds via mounted secrets
Summary: CVE-2021-3344 openshift/builder: privilege escalation during container image ...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2021-3344
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1916897 1920626 1921965 1921966 1951569
Blocks: 1921172 1922165
TreeView+ depends on / blocked
 
Reported: 2021-01-28 02:18 UTC by Sam Fowler
Modified: 2021-07-20 10:55 UTC (History)
22 users (show)

Fixed In Version: github.com/openshift/builder v0.0.0-20210125201112-7901cb396121
Clone Of:
Environment:
Last Closed: 2021-02-08 14:41:55 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2021:0308 0 None None None 2021-02-08 13:50:44 UTC
Red Hat Product Errata RHSA-2021:0428 0 None None None 2021-03-03 04:40:31 UTC

Description Sam Fowler 2021-01-28 02:18:27 UTC
In OpenShift Container Platform 4, a privilege escalation path exists in Builds via the re-use of credentials mounted into /run/secrets. An OpenShift user able to execute code in a build container can re-use the credentials to overwrite arbitrary container images in internal registries and potentially execute arbitrary code.

Comment 12 Sam Fowler 2021-02-04 06:17:40 UTC
Upstream fix:

https://github.com/openshift/builder/pull/206

Comment 14 errata-xmlrpc 2021-02-08 13:50:41 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.6

Via RHSA-2021:0308 https://access.redhat.com/errata/RHSA-2021:0308

Comment 15 Product Security DevOps Team 2021-02-08 14:41:55 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-3344

Comment 16 Sam Fowler 2021-02-10 01:31:52 UTC
Mitigation:

The affected build strategies include docker, source and custom builds, hence these can be disabled as per the documentation[1]. This does however, exclude the Jenkins build strategy as it is not affected and does not have to be disabled. 

[1] https://docs.openshift.com/container-platform/4.6/builds/securing-builds-by-strategy.html

On clusters where builds are allowed only grant permissions to perform builds to users who you wish to be to able to view, modify and edit all cluster resources.

Comment 17 errata-xmlrpc 2021-03-03 04:40:30 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.5

Via RHSA-2021:0428 https://access.redhat.com/errata/RHSA-2021:0428


Note You need to log in before you can comment on or make changes to this bug.